Key Takeaways
- State-sponsored hackers from North Korea impersonated a trading firm and cultivated relationships within Drift Protocol for half a year before executing a $270 million theft on April 1.
- The perpetrators attended industry conferences in person across several nations and invested more than $1 million in legitimate capital to establish credibility.
- Security breaches occurred through a malicious TestFlight application and exploitation of a documented vulnerability in VSCode/Cursor development environments.
- Security researchers have linked the operation to UNC4736, a threat group also identified as AppleJeus or Citrine Sleet, with connections to North Korea.
- Legal experts suggest the breach could represent civil negligence, with class action lawsuit advertisements already emerging.
On April 1, Drift Protocol fell victim to a devastating $270 million security breach orchestrated by a North Korean state-backed hacking collective that had spent approximately six months establishing trust and access within the organization.
[[EMBED_0]]
Initial contact occurred at a prominent cryptocurrency conference during the fall of 2025. The threat actors presented themselves as representatives of a quantitative trading operation, arriving with impressive technical credentials, authenticated professional histories, and comprehensive knowledge of Drift’s infrastructure and operations.
A Telegram channel was established for ongoing communications, initiating months of dialogue. Discussion topics mirrored typical conversations between DeFi protocols and trading firms: vault integration procedures, trading methodologies, and operational logistics.
During the December 2025 to January 2026 timeframe, the operation formally launched an Ecosystem Vault on Drift. The group participated in numerous collaborative sessions with platform contributors and committed over $1 million of actual capital to reinforce their legitimacy.
Drift contributors encountered representatives from the supposed trading firm in person at multiple industry events spanning several countries throughout February and March 2026. By the time April 1 arrived, the professional relationship had matured over nearly half a year.
The Technical Exploitation Method
The compromise utilized two distinct attack vectors. Initially, a team member installed a TestFlight application — Apple’s pre-release software distribution system that circumvents standard App Store security validation — which the attackers promoted as their proprietary wallet solution.
Additionally, the threat actors leveraged a documented security flaw in VSCode and Cursor, two popular code editing platforms. The vulnerability allowed malicious code execution simply by opening a file within either editor, with no visible alerts or warnings presented to the user.
After gaining control of compromised systems, the attackers collected necessary credentials to secure two multisig authorizations. These pre-authorized transactions remained inactive for over a week before activation on April 1, resulting in the extraction of $270 million in less than sixty seconds.
Security analysts have attributed the operation to UNC4736, alternatively designated as AppleJeus or Citrine Sleet. Blockchain analysis revealed fund movement patterns connecting to the Radiant Capital compromise from October 2024, which authorities also linked to North Korean actors. The individuals who physically attended conferences were not North Korean citizens — intelligence indicates DPRK-affiliated operations routinely employ third-party proxies with fabricated but verifiable identities.
Legal Implications and Security Analysis
Cryptocurrency legal specialist Ariel Givner indicated the incident could constitute civil negligence. She noted that fundamental security protocols — including maintaining signing keys on air-gapped hardware and conducting thorough background checks on developers encountered at industry events — were apparently not implemented.
“Every reputable project understands this. Drift failed to implement it,” Givner stated. Marketing materials for class action litigation against Drift have already begun appearing.
Drift reported possessing “medium-high confidence” that identical threat actors executed the October 2024 Radiant Capital breach, where malicious software was distributed through Telegram by someone impersonating a former contractor.



